UT researchers show how easy it is to spoof unencrypted GPS signals used by drones

(Phys.org) -- Professor Todd Humphreys of the University of Texas is making a lot of people nervous. First he and his team demonstrated their ability to circumvent the signals a drone flying over the university stadium was using to plot its course, causing it to nearly crash into the ground, before suddenly saving it from certain destruction. And as if that wasnt enough to make the point that drones flying using unencrypted GPS signals are vulnerable to spoofing, surely another demonstration he and his team gave for representatives of the Federal Aviation Administration and Department of Homeland Security drove the point home. They were very easily able to fool a drone in a test at White Sands Missile Range, with an inexpensively made device, into following the commands given by his team on multiple occasions.

Up till now, the main concern regarding drones, other than privacy or moral issues, has been the knowledge that practically anyone can obtain a jamming device that prevents a drone from hearing GPS signals being sent by a satellite, thereby causing it to fly blind. Most such drones are programmed to land themselves if such an event occurs. Many believe this is exactly what happened last year when Iran claimed to have successfully brought down a US military drone flying over its airspace. Unfortunately, it appears, there is a far greater threat and it comes from spoofers, rather than jammers.

Spoofers are devices that fool other devices into believing that its the device they are supposed to be communicating with. In the case of drones, a spoofing device can send out a signal that is stronger than the signal the drone receives from a satellite. By matching the signal, the spoofer is able to fool the drone into thinking its still getting its data from the satellite and thus becomes a trusted source. Once that occurs, those running the spoofing device can send commands to the drone causing it to behave as they indicate, ignoring those that come from other sources, in essence, allowing the drone to be hijacked by anyone with such a device. It should be noted that this is only possible with drones that use unencrypted GPS signaling, e.g. most non-military drones.

Humphreys told the officials at the demo that all of his equipment together cost only about a thousand dollars to put together, meaning the technology is easily accessible by anyone wishing to take over a drone for purposes other than for demonstration. In such cases, drones could be made to crash into buildings, sporting stadiums, other planes or any other target they choose. Particularly troubling is the fact that the FAA has outlined a plan for allowing commercial drones to fly in the United States by 2015, most of which would be flying using unencrypted GPS signals.

Humphreys and his team are hoping the demonstrations convince government officials to make changes to requirements on GPS signaling devices on drones before allowing them to fly in US air space.

Related Stories

(PhysOrg.com) -- In the aftermath of the Iran capture of a US military drone earlier this month now come arguments over how Iran managed to pull it off. An Iranian engineers exclusive interview with The Christian Science Monitor has been published, which details how the Iranians captured the drone through ...

(PhysOrg.com) -- Oil spills represent a significant danger to the oceans of the world. Many of us watched the DeepWater Horizon Oil Spill in the Gulf of Mexico and wished that there was a simple way to clean ...

Recommended for you

Small semi-aqueous arthropods, such as mosquitoes and water striders, are free to go about their waterborne business thanks to their unique leg-based adaptations, which repel water and allow them to float ...

Reading a text is something that each of us does at our own individual pace. This simple fact has been exploited by computer scientists in Saarbrücken who have developed a software system that recognizes ...

Based on OLED technology and implemented by means of a printing machine, this method developed by VTT Technical Research Centre of Finland Ltd provides an opportunity to create patterned and flexible light-emitting ...

A new simple tool developed by nanoengineers at the University of California, San Diego, is opening the door to an era when anyone will be able to build sensors, anywhere, including physicians in the clinic, ...